Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,011,0636 Segmented networks that implement scanning
Systems for providing scanning within distributed services are provided herein. In some embodiments, a system includes a plurality of segmented environments...
US-1,011,0632 Methods and systems for managing security policies
Methods, machines, and systems manage security policies of heterogeneous infrastructure and computing devices of a network. Security policy repository houses...
US-1,011,0624 Discovering and provisioning computing devices in a security enhanced environment
Systems and methods for discovering and provisioning computing devices within a computing environment. An example method may comprise: loading a first kernel...
US-1,011,0617 Modular model workflow in a distributed computation system
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security...
US-1,011,0614 Strengthening integrity assurances for DNS data
One or more DNS services are provided that are configured to not only tolerate some commonly observed DNSSEC misconfigurations (while still providing DNSSEC's...
US-1,011,0611 Multi-level security enforcement utilizing data typing
A computer-implemented method, a computer system, and a computer program product are provided for enforcing multi-level security (MLS) on a message transmitted...
US-1,011,0606 Reverse access method for securing front-end applications and others
A system and method for providing a secured connection between servers on a local area network (LAN) and clients on a wide area network (WAN) via a ...
US-1,011,0602 Secure internal data network communication interfaces
A system, method, and apparatus for providing secure communications to one or more users through an unclassified network. The system may include a network...
US-1,011,0594 Header section download of package
A header section of a package may be downloaded from a server. The header section may be analyzed to determine if a data section of the package is secure and a...
US-1,011,0588 Systems and methods for providing multimedia content within an application and a security solution integrated...
A system is provided for downloading, for distribution and for acoustic reproduction of a music album, which includes at least one or several digital music...
US-1,011,0575 Systems and methods for secure data exchange
Embodiments described herein provide enhanced computer- and network-based systems and methods for providing data security with respect to computing services,...
US-1,011,0572 Tape drive encryption in the data path
Implementations described and claimed herein provide encryption in the data path. In one implementation, login parameters from a primary data center are...
US-1,011,0570 Providing load balanced secure media content and data delivery in a distributed computing environment
A system and method for providing load balanced secure media content and data delivery in a distributed computing environment is disclosed. Media content is...
US-1,011,0527 Systems and methods for secure data exchange in a distributed collaborative application
A collaborative communication system that includes a plurality of endpoints and interconnecting nodes configured to communicate via messages over...
US-1,011,0380 Secure dynamic on chip key programming
Provisioning an integrated circuit with confidential data, by receiving in the integrated circuit encrypted confidential data, the encrypted confidential data...
US-1,011,0379 System and methods for permitting open access to data objects and for securing data within the data objects
A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the...
US-1,011,0322 Secure open-air communication system utilizing multichannel decoyed transmission
A secure communication system utilizes multiple "decoy" data signals to hide one or more true data signals. The true data signal(s) are encrypted, and received...
US-1,011,0163 Security and tracking systems including energy harvesting components for providing autonomous electrical power
A security system is provided that integrates a unique set of structural features for concealing self-powered sensor and communication devices in aesthetically...
US-1,010,9230 Systems and methods for storing digital content
System and method for storing digital content for display on a display device, comprising at least one digital content item, configured to be displayed on the...
US-1,010,9171 Systems and methods for performing security actions based on people's actual reactions to interactions
The disclosed computer-implemented method for performing security actions based on people's actual reactions to interactions may include (i) detecting an...
US-1,010,9142 System and method for selective encryption of input data during a retail transaction
A retail environment having retail terminals with data entry point devices selectively encrypts input received by the data entry point devices and passes the...
US-1,010,9124 Method, system and device for securing and managing access to a lock and providing surveillance
A method for commissioning a collection of electronic locks by inserting the same electronic key into each of the locks and recording in the electronic key and...
US-1,010,9009 Systems and methods regarding targeted dissemination
One exemplary aspect comprises a computer-implemented method comprising: (a) electronically receiving, from a first securities market participant, data...
US-1,010,8956 Methods and systems for using physical payment cards in secure E-commerce transactions
Methods and systems for conducting a secure online transaction with a payment card are described. In an embodiment, a user selects a secure payment option...
US-1,010,8924 Methods and apparatus to emulate a toy
Methods, apparatus, systems and articles of manufacture to emulate a toy are disclosed. An example method includes identifying a toy to be emulated by a mobile...
US-1,010,8900 Jewelry with security bezel for regulating near field communication with an embedded near field communication chip
An article of jewelry comprising a precious or semi-precious gem; a near field communication (NFC) chip; and a bezel, wherein the bezel comprises an...
US-1,010,8875 Information processing device, information processing method, information processing program, and recording medium
An image processing device configured to process image data obtained externally, the image processing device including a preprocessing circuit configured to...
US-1,010,8816 Remote data viewer
A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and...
US-1,010,8813 Query conditions-based security
A system and article of manufacture for managing access to queries and, more particularly, for managing access by multiple users to persistently stored queries....
US-1,010,8811 Dynamic secure interactive electronic vault
Disclosed herein is a system for enabling secure data storage into a third party managed electronic vault that provides users with a secure location to store...
US-1,010,8810 System and method for secure document embedding
The example non-limiting technology herein uses a Microsoft Office module or other application that automatically encrypts an Office document (Excel,...
US-1,010,8807 Secure data parser method and system
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data...
US-1,010,8799 Resource usage optimized auditing of database shared memory
A method for security auditing of database transactions is provided in the illustrative embodiments. For a specified period, an available capacity of a...
US-1,010,8796 System and method for PIN entry on mobile devices
A system for entering a secure Personal Identification Number (PIN) into a mobile computing device includes a mobile computing device and a peripheral device...
US-1,010,8614 Document handling in a web application
A unique document handling facility on the scale of a Lotus Notes document. Preferably, the documents are stored in a relational database and served-up using...
US-1,010,8435 Short message service security for zero touch deployments
Presented herein are techniques for enabling the zero touch deployment of devices having an integrated wireless wide area network (WWAN) interface. In one...
US-1,010,8181 Motor drive system data interface system and method
A motor drive system includes a motor drive processor, a motor drive memory component, a server, and a display that displays a machine readable code, wherein...
US-1,010,7014 Security system with anti-tampering sensors and cybersecurity
The disclosed embodiments include a method for tamper-proof protection of containers used for shipment of goods. The system contains a lock with electronic and...
US-1,010,5982 Security element having a lenticular image
A security element for securing security papers, value documents and other data carriers, has a lenticular image that, from different viewing directions,...
US-1,010,5108 First responder dispatch system and methods of operation thereof
A first responder dispatch system is disclosed comprising a sensing wearable configured to be worn by a first responder. The sensing wearable can comprise a...
US-1,010,4796 Data storage securing device
A data storage securing device configured to receive a data storage comprises a shell, a bracket slidably installed in the shell, and a locking module. The...
US-1,010,4567 System and method for event based internet of things (IOT) device status monitoring and reporting in a mobility...
Protocol agnostic wrapping (PAW) and/or data analytics engine (DAE) functions are embedded within a service capability exposure function (SCEF) entity for...
US-1,010,4433 Display apparatus, broadcast signal receiving apparatus and control methods thereof
A display apparatus, a broadcast signal receiving apparatus and methods thereof are provided. The display apparatus includes a signal receiver configured to...
US-1,010,4152 Inter-application communication and integration broker
A system for intermediated communication between applications running on the same computer is presented. The system routes communication between a first...
US-1,010,4122 Verified sensor data processing
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example,...
US-1,010,4114 Method and apparatus for testing a security of communication of a device under test
A test apparatus for testing a security of communication of a device under test, DUT, wherein the test apparatus comprises an RF unit having an RF interface...
US-1,010,4113 Using machine learning for classification of benign and malicious webpages
In an embodiment, a data processing method providing an improvement in computer security, comprises selecting a uniform resource location (URL) for...
US-1,010,4102 Analytic-based security with learning adaptability
An analytics-based security monitoring system is adapted to receive data, such as in the form of event logs, from one or more network devices transferred...
US-1,010,4101 Method and apparatus for intelligent aggregation of threat behavior for the detection of malware
Embodiments disclosed herein are directed to intelligent malware detection. A scanner server is used to scan an endpoint device for malware. Various attributes...
US-1,010,4074 Independent biometric identification system
The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.